Loose Leaf Security-logo

Loose Leaf Security

Technology Podcasts

Loose Leaf Security is a podcast about making good computer security practice for everyone. We believe you don't need to be a software engineer or security professional to understand how to keep your devices and data safe. In every episode, we tackle a typical security concern or walk you through a recent incident.

Location:

United States

Description:

Loose Leaf Security is a podcast about making good computer security practice for everyone. We believe you don't need to be a software engineer or security professional to understand how to keep your devices and data safe. In every episode, we tackle a typical security concern or walk you through a recent incident.

Language:

English


Episodes
Ask host to enable sharing for playback control

Covering your webcams

8/22/2019
Liz and Geoffrey take a look at how attackers compromise webcams and discuss why it's worth physically covering them. Malware and alleged threats of malware are only some of the avenues attackers take to access other people's webcams; vulnerabilities in legitimate software, like the recent Zoom security flaw, can also be exploited. Additionally, sharing ownership of your devices with another party like your school district or workplace may leave you and your webcams exposed. In the news, the...

Duration:00:30:24

Ask host to enable sharing for playback control

Password managers: how they should work and when they didn't

6/27/2019
Liz and Geoffrey discuss password manager extensions in depth: everything from how they keep your passwords safe from malicious websites to how they sync your passwords between your devices to how they've made mistakes in the past. If you haven't picked a password manager yet, this hard look into the security records of popular password managers sheds light on which companies have earned your trust, but even if you're a long-time password manager user, knowing about their usual pitfalls...

Duration:00:46:31

Ask host to enable sharing for playback control

Two-factor tidying

5/16/2019
With a wide variety of possible two-factor authentication methods, it's difficult to keep track of which ones you're using - and which ones you could be using. Liz and Geoffrey talk about their personal strategies and how to handle difficult cases like custom authenticator apps. In recent news, there's improvements to using security keys with Google accounts and some surprises with automatic updates. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:29:56

Ask host to enable sharing for playback control

Using a password manager effectively

3/20/2019
In a deeper exploration of password manager browser extensions and features for sharing as well as a survey of alternatives to password managers, Liz and Geoffrey go back to the topic of Loose Leaf Security's very first episode and discuss how password managers keep them safe in practice. In the news, a research firm makes dramatic claims about password manager security, and Facebook expands data tracking in worrisome ways. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:41:40

Ask host to enable sharing for playback control

Checks, mobile banking, cash transfer apps, and a bit more on credit cards

2/19/2019
Liz and Geoffrey take a closer look at the security of checks and bank account numbers - a timely topic after a fraudster attempted to steal thousands of dollars from Liz with a counterfeit check - and also at mobile banking, cash transfer apps, and a bit more about credit cards. Plus, better encryption for Android, a major FaceTime bug, and practical lessons from Wells Fargo's day-long outage. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:50:00

Ask host to enable sharing for playback control

Credit and debit card security

1/29/2019
An important part of your personal digital security is making sure your credit and debit cards are secure. In this episode, Liz and Geoffrey take a look at how attackers clone credit and debit cards, how newer cards resist these attacks, whether it's safer to use mobile payment apps, and how to keep an eye on your credit reports. Also, cell phone carriers continue to sell your location data, and phishing attacks against accounts with two-factor auth have become more powerful. Show notes,...

Duration:00:31:43

Ask host to enable sharing for playback control

Security stories: surveillance databases, unlocking apps, unexpected photo booths, and evolving data

12/25/2018
In a special holiday episode, Liz and Geoffrey take a look at some recent security stories in more detail, from surveillance databases facilitating identity theft to unexpected facial recognition at concerts to changes in the meaning of social network activity. They also discuss how to properly secure high-value apps on your phone and some of their own plans to improve their security over winter break. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:33:03

Ask host to enable sharing for playback control

Built-in dangers: physical ports, OS defaults, and remote access

12/13/2018
From the fancy new USB-C or Thunderbolt ports on your laptop to the software and settings that came with your operating system, there are a lot of potential security concerns with recent computers. Liz and Geoffrey finish up their series on desktop and laptop security by looking at some of the latest threats - and why computers with old-style USB ports aren't much safer. Plus, some new scams to avoid and the scoop on some juicy internal Facebook documents. Show notes, timeline, and full...

Duration:00:36:37

Ask host to enable sharing for playback control

Malware, antivirus, and safe downloads

11/20/2018
Malware, viruses, worms, adware - whatever you call them, you don't want them on your computer. But how do you keep them away? We take a look at the surprisingly involved process of downloading software from a trustworthy source, as well as the history of why desktop OSes are so vulnerable. Also, Liz talks Geoffrey out of running for office in Japan. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:35:17

Ask host to enable sharing for playback control

Backups

10/30/2018
Backups are an important part of keeping your devices secure - as mentioned last episode, backups not only help with lost devices but also let you easily and confidently wipe a compromised computer and get back to work quickly. Liz and Geoffrey take a look at different types of backups, including cloud versus local backups. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:22:49

Ask host to enable sharing for playback control

Physical attacks to your computers and disk encryption

10/18/2018
Liz and Geoffrey are back with a look at physical computer security - just how much trouble could someone cause if they got access to your laptop for a few minutes? - and what sorts of problems disk encryption can and cannot solve. Also, security issues at popular social media services cause trouble for 90 million Facebook users and every Google+ user. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:34:46

Ask host to enable sharing for playback control

Digital photos and privacy

9/18/2018
Digital photos contain more than meets the eye: they have metadata and other hidden information that can compromise your privacy. Liz and Geoffrey take a look at Exif metadata and other non-obvious ways that photos from your phone or camera might be sharing more than they want. Also, the new iOS 12 has some neat security features, and Yahoo! Mail has some not-so-neat privacy concerns. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:24:12

Ask host to enable sharing for playback control

Security stories: lost phones, a compromised computer, and an unexpected keyboard cat

9/4/2018
As a change of pace, Liz and Geoffrey take a look back at security incidents in their own lives and talk about lessons they've learned - why phone backups are important, an unintentional security hole, and a security key gone rogue. In security news, the GDPR results in mildly positive changes for web tracking, and Fortnite's installer has exactly the vulnerability we were afraid of. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:26:03

Ask host to enable sharing for playback control

Keeping your web browsing private

8/21/2018
In the third and last episode in the series on web security, Liz and Geoffrey look at HTTPS and how it keeps your web browsing both private and secure, and they also investigate private browsing or incognito mode and what exactly that mode does for your privacy. Plus, a new version of the protocol behind HTTPS and the latest Android release are cause for celebration, while Facebook and Google's approaches to data privacy are cause for concern. Show notes, timeline, and full transcript on...

Duration:00:24:55

Ask host to enable sharing for playback control

Web security continued: cookies, plugins, and extensions

8/7/2018
Continuing our exploration of web browser security from last episode, Liz and Geoffrey look into cookies, JavaScript, extensions, and plugins and discuss how best to mitigate their privacy and security risks while browsing the web. Plus, a serious Reddit breach provides a timely reminder to toughen your two-factor. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:25:37

Ask host to enable sharing for playback control

The history of the Web and an introduction to browser security

7/24/2018
The web can be a scary place - but once you get to know it a little better, it doesn't feel as scary. Liz and Geoffrey go back to 1990 to figure out how the web came to be what it is today and discuss how browsers keep us safe. Also, two very good improvements to HTTPS in today's version of Chrome, and the future of Android security just got a whole lot more complicated. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:24:54

Ask host to enable sharing for playback control

Comparing Android and iOS security

7/10/2018
Considering buying a new phone? Liz and Geoffrey compare the different security models of Android and iOS, the two most popular smartphone options on the market. We also talk about California's new privacy law, a number of recent attacks on cell phones, and how Tinder swiped left on bad crypto. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:22:57

Ask host to enable sharing for playback control

Securing your phone

6/26/2018
We take our phones everywhere and trust them with a lot of sensitive information, but have we put enough thought into how to secure them? Liz and Geoffrey discuss different aspects of securing the smartphone you have, including passcodes, location services, notifications, and digital voice assistants. Plus, a question from a caller and a major Supreme Court decision! Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:25:18

Ask host to enable sharing for playback control

Two-factor authentication and account recovery

6/12/2018
Last time we talked about strong passwords, but what if there was a better way to secure your account? We look at options for two-factor authentication, including text messages, apps, and security keys. Plus, security news from Apple, one of Liz's accounts got breached, and Geoffrey wants to celebrate a special birthday. Show notes, timeline, and full transcript on looseleafsecurity.com

Duration:00:28:21

Ask host to enable sharing for playback control

Securing your online account passwords

5/29/2018
You've heard for years about how to come up with strong passwords, but are those guidelines really true? Liz and Geoffrey talk about new risks to your online accounts, especially with the news of clear-text passwords being mishandled at Twitter and GitHub, and whether you should trust a password manager to solve all your password problems for you. Plus, what's happening to the green lock icon in Chrome, and should you worry about EFAIL? Show notes, timeline, and full transcript on...

Duration:00:25:16